Networking X-Series Switches User Guide
Page 9
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_AstuteUG_PrintTOC.fm 19 Network Administration: DHCP Server 309 Overview 309 DHCP Server Properties 310 Network Pool 311 Static Hosts 313 Address Binding 315 Excluded Addresses 316 20 Network Administration: Power Management 317 Green Ethernet 317 Power Over Ethernet (PoE 320 21 Network Administration: sFlow 323 22 Using the CLI 327 Using the CLI 327 CLI Command Conventions 330 Accessing the Device Through the CLI 331 IPv6 Address Conventions 331 23 CLI 333 clear counters 333 Contents 9
FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_AstuteUG_PrintTOC.fm 19 Network Administration: DHCP Server 309 Overview 309 DHCP Server Properties 310 Network Pool 311 Static Hosts 313 Address Binding 315 Excluded Addresses 316 20 Network Administration: Power Management 317 Green Ethernet 317 Power Over Ethernet (PoE 320 21 Network Administration: sFlow 323 22 Using the CLI 327 Using the CLI 327 CLI Command Conventions 330 Accessing the Device Through the CLI 331 IPv6 Address Conventions 331 23 CLI 333 clear counters 333 Contents 9
Networking X-Series Switches User Guide
Page 24
... PRELIMINARY 8/9/16 - FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_Features.fm Device Management Features SNMP Alarms and Trap Logs The system logs events with severity codes and timestamps. A list of CLI commands that serves HTML pages, through DHCP. Configuration File The device... of community entries is assigned manually or through which the system can access the Community table. DELL CONFIDENTIAL - For more information, see Network Administration: SNMP Monitoring. The system internally converts web-based input into configuration...
... PRELIMINARY 8/9/16 - FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_Features.fm Device Management Features SNMP Alarms and Trap Logs The system logs events with severity codes and timestamps. A list of CLI commands that serves HTML pages, through DHCP. Configuration File The device... of community entries is assigned manually or through which the system can access the Community table. DELL CONFIDENTIAL - For more information, see Network Administration: SNMP Monitoring. The system internally converts web-based input into configuration...
Networking X-Series Switches User Guide
Page 26
...maintain domain name databases containing their corresponding IP addresses. CLI is translated into IP addresses. The time is a protocol that enables event notifications to be stored locally. DELL CONFIDENTIAL - The CLI interpreter provides command and keyword completion to a remote SYSLOG server. Time... Universal Time (UTC) synchronization up to IP addresses from its local DNS cache or from a DNS server. Command Line Interface Command Line Interface (CLI) is the highest), the more information, see Domain Name System (DNS). SYSLOG Syslog is synchronized from the...
...maintain domain name databases containing their corresponding IP addresses. CLI is translated into IP addresses. The time is a protocol that enables event notifications to be stored locally. DELL CONFIDENTIAL - The CLI interpreter provides command and keyword completion to a remote SYSLOG server. Time... Universal Time (UTC) synchronization up to IP addresses from its local DNS cache or from a DNS server. Command Line Interface Command Line Interface (CLI) is the highest), the more information, see Domain Name System (DNS). SYSLOG Syslog is synchronized from the...
Networking X-Series Switches User Guide
Page 30
...that validates ARP packets in the same Broadcast domain (VLAN) with proprietary protocols such as CDP, VTP, DTP, UDLD, PaGP, and SSTP. DELL CONFIDENTIAL - PRELIMINARY 8/9/16 - For more information, see Dynamic ARP Inspection (DAI). For more information on a TCP/IP network. For more ...This capability protects the network from certain man-inthe-middle attacks. Proprietary Protocol Filtering This feature enables user control over the filtering of CLI commands with invalid IP-to be filtered, for example: CDP and VTP. The user can serve as a DHCP server, see Port ...
...that validates ARP packets in the same Broadcast domain (VLAN) with proprietary protocols such as CDP, VTP, DTP, UDLD, PaGP, and SSTP. DELL CONFIDENTIAL - PRELIMINARY 8/9/16 - For more information, see Dynamic ARP Inspection (DAI). For more information on a TCP/IP network. For more ...This capability protects the network from certain man-inthe-middle attacks. Proprietary Protocol Filtering This feature enables user control over the filtering of CLI commands with invalid IP-to be filtered, for example: CDP and VTP. The user can serve as a DHCP server, see Port ...
Networking X-Series Switches User Guide
Page 87
...Enter server address where backup file is suggested to use the dir command to the active image, and then reboot the switch. One of ...Management > File Update and Backup > Active Firmware Image. 2 Click Edit. If you have CLI access to the device, you click Apply indicates that ten packets were successfully transferred. You can ...backup process. Destination File Name - PRELIMINARY 8/9/16 - DELL CONFIDENTIAL - The switch boots from the active image. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_SwitchManagement.fm • Software Image -...
...Enter server address where backup file is suggested to use the dir command to the active image, and then reboot the switch. One of ...Management > File Update and Backup > Active Firmware Image. 2 Click Edit. If you have CLI access to the device, you click Apply indicates that ten packets were successfully transferred. You can ...backup process. Destination File Name - PRELIMINARY 8/9/16 - DELL CONFIDENTIAL - The switch boots from the active image. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_SwitchManagement.fm • Software Image -...
Networking X-Series Switches User Guide
Page 327
Command Mode Overview The CLI is divided into command modes, each mode, a specific command is used to access configuration sub-systems. DELL CONFIDENTIAL - These modes are described below. Only a limited subset of commands available for that do not change the terminal configuration and is available in User EXEC mode. Entering a question mark at the terminal prompt displays...
Command Mode Overview The CLI is divided into command modes, each mode, a specific command is used to access configuration sub-systems. DELL CONFIDENTIAL - These modes are described below. Only a limited subset of commands available for that do not change the terminal configuration and is available in User EXEC mode. Entering a question mark at the terminal prompt displays...
Networking X-Series Switches User Guide
Page 328
...For example: console# To list the Privileged EXEC commands, type a question mark at the command prompt. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_Using_CLI.fm After logging into the device, User EXEC command mode is console unless it has been modified ... host name followed by the angle bracket (>). NOTE: The enable command is required (if configured). FOR PROOF ONLY 328 Using the CLI PRELIMINARY 8/9/16 - Passwords are case-sensitive. The User EXEC commands enable connecting to secure operating parameters. To enter the next level...
...For example: console# To list the Privileged EXEC commands, type a question mark at the command prompt. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_Using_CLI.fm After logging into the device, User EXEC command mode is console unless it has been modified ... host name followed by the angle bracket (>). NOTE: The enable command is required (if configured). FOR PROOF ONLY 328 Using the CLI PRELIMINARY 8/9/16 - Passwords are case-sensitive. The User EXEC commands enable connecting to secure operating parameters. To enter the next level...
Networking X-Series Switches User Guide
Page 329
...A password is not required to system features, rather than a specific protocol or interface. FOR PROOF ONLY Using the CLI 329 Global Configuration commands apply to access this level. PRELIMINARY 8/9/16 - The Global Configuration mode displays as the device host name followed by ...#: console# configure console(config)# To list the Global Configuration commands, enter a question mark at the Privileged EXEC Mode prompt, type configure and press . DELL CONFIDENTIAL - To access Global Configuration mode, at the command prompt. To configure the device, enter the next level, ...
...A password is not required to system features, rather than a specific protocol or interface. FOR PROOF ONLY Using the CLI 329 Global Configuration commands apply to access this level. PRELIMINARY 8/9/16 - The Global Configuration mode displays as the device host name followed by ...#: console# configure console(config)# To list the Global Configuration commands, enter a question mark at the Privileged EXEC Mode prompt, type configure and press . DELL CONFIDENTIAL - To access Global Configuration mode, at the command prompt. To configure the device, enter the next level, ...
Networking X-Series Switches User Guide
Page 330
.... A selection of keys clicked simultaneously, for the flowcontrol command either auto, on, or off } means that port. DELL CONFIDENTIAL - PRELIMINARY 8/9/16 - Any individual key on the console. FOR PROOF ONLY 330 Using the CLI Table 22-1. For example click . FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_Using_CLI.fm The following table...
.... A selection of keys clicked simultaneously, for the flowcontrol command either auto, on, or off } means that port. DELL CONFIDENTIAL - PRELIMINARY 8/9/16 - Any individual key on the console. FOR PROOF ONLY 330 Using the CLI Table 22-1. For example click . FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_Using_CLI.fm The following table...
Networking X-Series Switches User Guide
Page 331
... of an IPv6z address is: {ipv6-link-local-address}%{interface-id}. All CLI commands can manage the device using CLI commands via a Telnet connection and via a console connection. Refers to the IPv6 address on the single interface on the interface specified. • ipv6_address%0 - DELL CONFIDENTIAL - PRELIMINARY 8/9/16 - IPv6 Address Conventions If the IPv6 address is...
... of an IPv6z address is: {ipv6-link-local-address}%{interface-id}. All CLI commands can manage the device using CLI commands via a Telnet connection and via a console connection. Refers to the IPv6 address on the single interface on the interface specified. • ipv6_address%0 - DELL CONFIDENTIAL - PRELIMINARY 8/9/16 - IPv6 Address Conventions If the IPv6 address is...
Networking X-Series Switches User Guide
Page 333
...be one of the following example clears the statistics counters for te0/1. Command Mode Privileged EXEC mode Example The following types: Ethernet port or port-channel. Syntax clear logging Parameters N/A DELL CONFIDENTIAL - console# clear counters te0/1 clear logging Use the clear... logging Privileged EXEC mode command to clear counters on all or on a specific interface. PRELIMINARY 8/9/16 - CLI The following commands can be used to configure the device...
...be one of the following example clears the statistics counters for te0/1. Command Mode Privileged EXEC mode Example The following types: Ethernet port or port-channel. Syntax clear logging Parameters N/A DELL CONFIDENTIAL - console# clear counters te0/1 clear logging Use the clear... logging Privileged EXEC mode command to clear counters on all or on a specific interface. PRELIMINARY 8/9/16 - CLI The following commands can be used to configure the device...
Networking X-Series Switches User Guide
Page 334
... a source file to a destination file. PRELIMINARY 8/9/16 - console# clear logging Clear Logging Buffer ? (Y/N)[N] configure The configure Privileged EXEC mode command enters the Global Configuration mode. FOR PROOF ONLY 334 CLI DELL CONFIDENTIAL - Command Mode Privileged EXEC mode Example The following example clears messages from the internal logging buffer. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new...
... a source file to a destination file. PRELIMINARY 8/9/16 - console# clear logging Clear Logging Buffer ? (Y/N)[N] configure The configure Privileged EXEC mode command enters the Global Configuration mode. FOR PROOF ONLY 334 CLI DELL CONFIDENTIAL - Command Mode Privileged EXEC mode Example The following example clears messages from the internal logging buffer. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new...
Networking X-Series Switches User Guide
Page 335
...files. If specified as the destination file, it is excluded if no method was specified Command Mode Privileged EXEC mode User Guidelines The location of the file system dictates the format of .... If specified as the source file, it is tftp://host/[directory]/filename. FOR PROOF ONLY CLI 335 The syntax for this alias is the non-active image file. • boot-Boot ...Source or destination URL for a TFTP network server. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_CLI_new.fm Syntax copy source-url destination-url Parameters • source-url-...
...files. If specified as the destination file, it is excluded if no method was specified Command Mode Privileged EXEC mode User Guidelines The location of the file system dictates the format of .... If specified as the source file, it is tftp://host/[directory]/filename. FOR PROOF ONLY CLI 335 The syntax for this alias is the non-active image file. • boot-Boot ...Source or destination URL for a TFTP network server. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_CLI_new.fm Syntax copy source-url destination-url Parameters • source-url-...
Networking X-Series Switches User Guide
Page 336
...; The source file and destination file are invalid combinations of ten packets (512 bytes each). FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_CLI_new.fm The entire copying process may take several minutes and differs from protocol to protocol and from network to the...an Image File from a Server to Flash Memory Use the copy source-url flash://image command to copy an image file from a Server to flash memory. PRELIMINARY 8/9/16 - FOR PROOF ONLY 336 CLI To use this image, the administrator must switch the inactive image to image, boot and...
...; The source file and destination file are invalid combinations of ten packets (512 bytes each). FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_CLI_new.fm The entire copying process may take several minutes and differs from protocol to protocol and from network to the...an Image File from a Server to Flash Memory Use the copy source-url flash://image command to copy an image file from a Server to flash memory. PRELIMINARY 8/9/16 - FOR PROOF ONLY 336 CLI To use this image, the administrator must switch the inactive image to image, boot and...
Networking X-Series Switches User Guide
Page 337
... configuration file as if the commands were typed in the commandline interface (CLI). Examples Example 1 - Loading file1 from the TFTP server 172.16.101.101 to the non-active image file. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_CLI_new.fm ...Use the copy source-url running-config command to load a configuration file from a network server to the device startup configuration file. FOR PROOF ONLY CLI 337 console# copy tftp://172.16.101...
... configuration file as if the commands were typed in the commandline interface (CLI). Examples Example 1 - Loading file1 from the TFTP server 172.16.101.101 to the non-active image file. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_CLI_new.fm ...Use the copy source-url running-config command to load a configuration file from a network server to the device startup configuration file. FOR PROOF ONLY CLI 337 console# copy tftp://172.16.101...
Networking X-Series Switches User Guide
Page 338
... file1 from the TFTP server with the key. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_CLI_new.fm Example 2 - When the key is generated). - FOR PROOF ONLY 338 CLI PRELIMINARY 8/9/16 - Copying an Image from 172.16.101.101 OK] Copy took 0:01...:11 [hh:mm:ss] crypto certificate generate The crypto certificate generate Global Configuration mode command generates a self-signed certificate for HTTPS. name-...
... file1 from the TFTP server with the key. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_CLI_new.fm Example 2 - When the key is generated). - FOR PROOF ONLY 338 CLI PRELIMINARY 8/9/16 - Copying an Image from 172.16.101.101 OK] Copy took 0:01...:11 [hh:mm:ss] crypto certificate generate The crypto certificate generate Global Configuration mode command generates a self-signed certificate for HTTPS. name-...
Networking X-Series Switches User Guide
Page 339
... PRELIMINARY 8/9/16 - cu country-Specifies the country name. (Length: 2 characters) • duration days-Specifies the number of them. Command Mode Global Configuration mode User Guidelines If the RSA key does not exist, you must use the ip https certificate... how to factory defaults automatically deletes the default keys and they are recreated during device initialization. FOR PROOF ONLY CLI 339 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_CLI_new.fm - or organization-Specifies the organization name. (Length: 1-64 characters) - If cn ...
... PRELIMINARY 8/9/16 - cu country-Specifies the country name. (Length: 2 characters) • duration days-Specifies the number of them. Command Mode Global Configuration mode User Guidelines If the RSA key does not exist, you must use the ip https certificate... how to factory defaults automatically deletes the default keys and they are recreated during device initialization. FOR PROOF ONLY CLI 339 FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_CLI_new.fm - or organization-Specifies the organization name. (Length: 1-64 characters) - If cn ...
Networking X-Series Switches User Guide
Page 340
... certificate number. (Range: 1-2). Syntax crypto certificate number import no form of the command to delete the user-defined keys and certificate. See Keys and Certificates for HTTPS. PRELIMINARY 8/9/16 - FOR PROOF ONLY 340 CLI FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_CLI_new.fm console(config)# crypto certificate 1 generate key-generate...
... certificate number. (Range: 1-2). Syntax crypto certificate number import no form of the command to delete the user-defined keys and certificate. See Keys and Certificates for HTTPS. PRELIMINARY 8/9/16 - FOR PROOF ONLY 340 CLI FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_CLI_new.fm console(config)# crypto certificate 1 generate key-generate...
Networking X-Series Switches User Guide
Page 387
... User EXEC mode User Guidelines CAUTION: Avoid running multiple show tech-support Privileged EXEC mode command to display system and configuration information that can be displayed. DELL CONFIDENTIAL - PRELIMINARY 8/9/16 - Use keywords to display than the configured session time out time. If you do not specify any parameters, the system... a problem. The show tech-support [config | memory] Parameters • memory-Displays memory and processor state data. • config-Displays switch configuration within the CLI commands supported on the network segment. FOR PROOF ONLY...
... User EXEC mode User Guidelines CAUTION: Avoid running multiple show tech-support Privileged EXEC mode command to display system and configuration information that can be displayed. DELL CONFIDENTIAL - PRELIMINARY 8/9/16 - Use keywords to display than the configured session time out time. If you do not specify any parameters, the system... a problem. The show tech-support [config | memory] Parameters • memory-Displays memory and processor state data. • config-Displays switch configuration within the CLI commands supported on the network segment. FOR PROOF ONLY...
Networking X-Series Switches User Guide
Page 402
...used to obtain configuration parameters, such as a network address. The part of Service (CoS). DSCP provides a method of line commands used , and the session is the 802.1p priority scheme. A set of tagging IP packets with priority information. Class of...Point (DSCP). There are composed of Service is restarted. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_Glossary.fm Class of a computer that processes information. CoS provides a method for tagging packets with QoS priority information. CLI Command Line Interface. PRELIMINARY 8/9/16 -
...used to obtain configuration parameters, such as a network address. The part of Service (CoS). DSCP provides a method of line commands used , and the session is the 802.1p priority scheme. A set of tagging IP packets with priority information. Class of...Point (DSCP). There are composed of Service is restarted. FILE LOCATION: C:\Users\gina\Desktop\Checkout_new\Dell Astute\User Guide\Dell_Astute_Glossary.fm Class of a computer that processes information. CoS provides a method for tagging packets with QoS priority information. CLI Command Line Interface. PRELIMINARY 8/9/16 -